A Short Study on Security Indicator Interfaces

Size: px
Start display at page:

Download "A Short Study on Security Indicator Interfaces"

Transcription

1 A Short Study on Security Indicator Interfaces Technical Report UCSC-WASP November 2015 D J Capelis Working-group on Applied Security and Privacy Storage Systems Research Center University of California, Santa Cruz Santa Cruz, CA This work was supported by

2 Abstract This technical report documents findings from a preliminary study on how users react to security indicators from a trusted hardware output channel. We recorded how a mixture of test messages affected users interactions with a simulated web form asking for account credentials. In this report we present the data and draw some conclusions on how this experiment informs trusted platform interface design, and specifically report findings relevant to the interface from our Lockbox project.

3 1 Introduction End-users frequently disregard, respond erratically or don t even notice the interfaces that are supposed to help them protect their machine. Here we examine hardware interfaces that provide end-users with an auxiliary security screen which displays information from a hardware security system. We are interested in finding out how users react to such a screen and determine whether or not such an interface allows user to make good security decisions. I designed an experiment where users were prompted to log in to a series of login forms. The screen displayed various iterations of text and we were able to test user s error rates as well as response times to various security displays. I observed both the timing information and the error rates of each screen. With statistical analysis, we draw several conclusions from the data. These supported some of our interface design assumptions, provide insight into phishing type attacks on these types of interfaces and suggest how the hardware should respond when there is no trusted channel present. These conclusions validated portions of the LockBox design as well as suggest possible tweaks for further accuracy in the future. 2 Experimental Design There are two very important metrics that determine success for a security system like this: Accuracy The user s ability to come to the correct conclusion. Cognitive Overhead How much thinking the user is required to do to come to a conclusion. While many, might consider the first metric to be most important, the second can be just as, or more, important. The amount of cognitive overhead a user experiences determines their willingness to use the system at all. Since the accuracy rate of a system that a user doesn t use is zero, it could be necessary to trade accuracy for lower cognitive overhead. That said, this data does not support the existence of a tradeoff between these two variables in this particular interface. Our results are consistent with the hypothesis that interfaces with lower cognitive overhead are also more accurate. Accuracy metrics were gathered by recording whether a user reached the correct decision. Tracking cognitive overhead was more difficult. Since there no neuroscientist or MRI machine was present in our lab, I recorded time between responses. This seems like a reasonable metric for cognitive overhead, but simply observing how quickly someone reacts is an indirect measure. 2.1 Subjects 20 subjects participated in the study. They were recruited from the University of California, Santa Cruz campus and Silicon Valley. The academic participants from UCSC s Computer Science department consisted of one professor, one undergraduate and five graduate students. In addition, two undergraduates and four graduate students participated from other departments at UCSC. Another was studying an unrelated field at Stanford. The remaining six participants worked full time for various Silicon Valley tech companies. The subjects ranged from 20 to 50 years of age. All were familiar with technology, but not all had chosen it as their vocation. Most were students. In general, the subjects were both young and very familiar with computers. 1

4 2.2 Pilot Study The first six participants were comprised the pilot subjects for the project. When it was found the pilot study was yielding valid data and the methodology appeared to be sufficient, we incorporated data from these subjects into our main study. The methodology did not change after the pilot study. At the conclusion, we verified that the pilot study participants did not produce significantly different results than the remaining users. 2.3 Test Procedure The test began by providing the subject with a series of instructions. Included in these instructions were information on the test, the methodology and the format. Users were given a username and password and shown an exact picture of contents of the screen they should accept. The users then moved on to a series of login forms where they were either able to login, or press a button that stated the form was insecure. The auxiliary security screen would change at each page and the user s responses where tracked. About 2/3rds of the way through the test, users were told that instead of different types of screens, they would only see two screens: the proper screen and a screen that said the input was insecure. At the conclusion of the test, the users provided feedback on a paper survey. In the first part of the study, the auxiliary screen displayed one of the following readouts during the study: A screen that read firefox. Users were instructed that this screen meant their input was secure. A screen that read Firefox. With the first letter capitalized. Users were instructed to press the button that said the form was insecure if the auxiliary security screen deviated from the lower case firefox readout. A screen that read f1refox. With the first i replaced by a 1. A screen that read internet explorer. The name of a complete different, but related program. A blank screen. In the second half of the test, users were given a screen that read out -INPUT INSECURE-. This interface of affirming an insecure state was compared to previous results where the insecure state was discovered by the lack of a proper security notification on the auxiliary screen. During the experiment, the subject sat at a computer terminal with a researcher seated behind them jotting observations on a post-it. The researcher had a view of the screen, the auxiliary screen and the user s input. Users did not appear to pick up on any signals from the observer as several thought they were doing badly when they were doing well or well when they were doing badly. The observer helped facilitate this neutrality by wearing a somber expression and a white lab coat. 3 Data The first 10 questions were screened out of the data as a training period. Since the user responded slowly at first and slowly grew better through the first 10 responses, these responses were screened out as not representative. In addition, we also screened out outliers where users took greater than 30 seconds. This happened only on a few datapoints. The observation notes confirmed the majority of these instances occurred when the subject paused during the test to ask a question or receive clarification. 2

5 3.1 Cognitive Overhead Metrics Cognitive overhead was based on a measure of time between responses. We present both the average responses in graph form as well as a few statistically significant statements that can be made about users cognitive overheads in one part of the experiment vs. another. Figure 1: Graph of the averages Figure 2: Graph of the averages, showing negative user responses shaded in blue and the excluded section of the results The following differences were all statistically significant: Users were quicker to respond during the phase of the test when the insecure state was affirmatively presented. (p=.029) Users were quicker to determine that the system was insecure when presented with an explicit warning instead of a blank screen. (p=.017) Users were quicker to respond after the training period. (p.01) 3.2 Accuracy Rates We present both raw and adjusted accuracy rates. The adjusted rates exclude data from three participants who produced particularly erratic and noisy data. These three participants either 3

6 didn t correctly understand the experiment or mistakenly assumed that one of the fake screens was correct and the right screen was fake through all or a portion of the experiment. (People seemed inclined to prefer a capital F in their Firefox and would actually begin reject the lowercase one even though they were prompted to use that instead.) These types of mistakes would be unlikely to occur in a design like LockBox s, so we excluded these particular cases in the adjusted results. Figure 3: The accuracy rate compared to baseline for each security screen using raw data Figure 4: The accuracy rate compared to baseline for each security screen using adjusted data 4

7 4 Findings While security interfaces are tricky and often involve high rates of user error, our findings yield two different findings security interfaces should take into account to increase their success rate. First, avoid interfaces which allow attackers to pick any strings on the security indicator. Both the accuracy and cognitive overhead data that users were faster and more accurate when they did not have to distinguish between various similar looking screens to determine which one was correct. This data supports the design approach made in LockBox to present users only with strings that they chose if a trusted channel is secure, or none at all. This design decision sets the interface in LockBox apart from interfaces which allow attackers to present users with similar name, such as in browser address bars in web browsers. The problems and challenges that present themselves for that type of interface are much greater. Second, when the system is in an insecure mode, affirmatively display this information to the user. A blank screen was less effective than an explicit message. Users were both faster and more accurate if the screen displayed an explicit warning that their input was insecure. This is not as obvious a conclusion as it might seem. Having the security screen always display one message or another runs a risk of user fatigue in the long term. A longer term study needs to be done to determine whether affirmative displays of insecure modes continue to result in increased speed and accuracy over the long term. However, the short term data in this study is consistent with the idea that explicit notification helps users reach faster determinations. These findings provide some hope that while security interfaces have often fallen short of providing the tools users need to effectively make good security decisions, better interfaces are possible. Accuracy rates increase significantly when interfaces avoid specific problems. Many existing systems have not been designed to avoid these mistakes, so continued poor results for these systems should not come as a surprise. With further study, security interfaces may one day achieve significantly higher levels of accuracy at reduced cognitive overhead. 5 Acknowledgements This material is based upon work supported by the National Science Foundation under Grant No Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation. 5

New Help Desk Ticketing System

New Help Desk Ticketing System New Help Desk Ticketing System Starting Monday, November 30, 2009 at 6 am the University will be going live with their new help desk ticketing system. The website to access the new ticketing system is

More information

Fan Fu. Usability Testing of Cloud File Storage Systems. A Master s Paper for the M.S. in I.S. degree. April, 2013. 70 pages. Advisor: Robert Capra

Fan Fu. Usability Testing of Cloud File Storage Systems. A Master s Paper for the M.S. in I.S. degree. April, 2013. 70 pages. Advisor: Robert Capra Fan Fu. Usability Testing of Cloud File Storage Systems. A Master s Paper for the M.S. in I.S. degree. April, 2013. 70 pages. Advisor: Robert Capra This paper presents the results of a usability test involving

More information

Office of Fleet and Asset Management (OFAM) www.dgs.ca.gov/ofam (Reserve a State Vehicle) Online Vehicle Reservation Instructions

Office of Fleet and Asset Management (OFAM) www.dgs.ca.gov/ofam (Reserve a State Vehicle) Online Vehicle Reservation Instructions Office of Fleet and Asset Management (OFAM) www.dgs.ca.gov/ofam (Reserve a State Vehicle) Online Vehicle Reservation Instructions Revised March 2, 2012 1 You must be an active California State Employee

More information

A Guide to the Tufts Network School of Arts and Sciences School of Engineering Fletcher School of Law and Diplomacy

A Guide to the Tufts Network School of Arts and Sciences School of Engineering Fletcher School of Law and Diplomacy A Guide to the Tufts Network School of Arts and Sciences School of Engineering Fletcher School of Law and Diplomacy What the Tufts Network has to Offer The Tufts network allows you access to your personal

More information

Software Requirements Specification

Software Requirements Specification METU DEPARTMENT OF COMPUTER ENGINEERING Software Requirements Specification SNMP Agent & Network Simulator Mustafa İlhan Osman Tahsin Berktaş Mehmet Elgin Akpınar 05.12.2010 Table of Contents 1. Introduction...

More information

WebSphere Application Server security auditing

WebSphere Application Server security auditing Copyright IBM Corporation 2008 All rights reserved IBM WebSphere Application Server V7 LAB EXERCISE WebSphere Application Server security auditing What this exercise is about... 1 Lab requirements... 1

More information

Web Help Desk - EASD Technology Support

Web Help Desk - EASD Technology Support Web Help Desk - EASD Technology Support EASDʼs Technology Services department has instituted a new tech request database system called Web Help Desk. This help desk system will now allow staff members

More information

Reference Guide for WebCDM Application 2013 CEICData. All rights reserved.

Reference Guide for WebCDM Application 2013 CEICData. All rights reserved. Reference Guide for WebCDM Application 2013 CEICData. All rights reserved. Version 1.2 Created On February 5, 2007 Last Modified August 27, 2013 Table of Contents 1 SUPPORTED BROWSERS... 3 1.1 INTERNET

More information

How to use SURA in three simple steps:

How to use SURA in three simple steps: How to use SURA in three simple steps: Most of SURA s functionality can be accessed through these three steps. 1) Download SURA to your computer Go to the SU Downloads page to obtain the SURA utility.

More information

Instructions For Opening UHA Encrypted Email

Instructions For Opening UHA Encrypted Email Receiving Encrypted Email You have received a secure, encrypted message from UHA. The message will contain the following notice and an attachment named SecureMessageAtt.hml. The attachment is shown circled

More information

Accessing the Illinois CRM Report Archive Database

Accessing the Illinois CRM Report Archive Database Accessing the Illinois CRM Report Archive Database Connecting to the Illinois CRM Report Archive Database The Illinois CRM Report Archive is a web-based database. Browsers supported are: Windows: Internet

More information

Required Virtual Interface Maps to... mgmt0. bridge network interface = mgmt0 wan0. bridge network interface = wan0 mgmt1

Required Virtual Interface Maps to... mgmt0. bridge network interface = mgmt0 wan0. bridge network interface = wan0 mgmt1 VXOA VIRTUAL APPLIANCE KVM Hypervisor In-Line Deployment (Bridge Mode) 2012 Silver Peak Systems, Inc. Support Limitations In Bridge mode, the virtual appliance only uses mgmt0, wan0, and lan0. This Quick

More information

Xerox Multifunction Devices. Verify Device Settings via the Configuration Report

Xerox Multifunction Devices. Verify Device Settings via the Configuration Report Xerox Multifunction Devices Customer Tips March 15, 2007 This document applies to these Xerox products: X WC 4150 X WCP 32/40 X WCP 35/45/55 X WCP 65/75/90 X WCP 165/175 X WCP 232/238 X WCP 245/255 X WCP

More information

Student Instructions for Registration and Login

Student Instructions for Registration and Login Student Instructions for Registration and Login Before you go online to register be sure you have: - A valid e-mail address - The MyMathLab Course ID from your instructor - A student access code, which

More information

How to Register and Pay for BEST Center Classes Online

How to Register and Pay for BEST Center Classes Online How to Register and Pay for BEST Center Classes Online Welcome to our new online registration system for The BEST Center at Genesee Community College! All of our scheduled noncredit classes are listed

More information

1. Cloud Data Center... 1. 2. Login to ICT Marketplace Portal... 1. 3. Dashboard... 2. 3. Data center management... 3. 3.1. New data center...

1. Cloud Data Center... 1. 2. Login to ICT Marketplace Portal... 1. 3. Dashboard... 2. 3. Data center management... 3. 3.1. New data center... Contents 1. Cloud Data Center... 1 2. Login to ICT Marketplace Portal... 1 3. Dashboard... 2 3. Data center management... 3 3.1. New data center... 3 4. View Data Centers... 6 5. Remove Data Centers...

More information

1. Introduction. 1.1 Purpose of this Document

1. Introduction. 1.1 Purpose of this Document 1. Introduction 1.1 Purpose of this Document The of the Software Requirements Specification is to outline the requirements for The American Academy's Education With an Elastic Workforce (EW2) product.

More information

MANUAL USER GUIDE FOR EMR PRIMARY HEALTH CARE SYSTEM

MANUAL USER GUIDE FOR EMR PRIMARY HEALTH CARE SYSTEM MANUAL USER GUIDE FOR EMR PRIMARY HEALTH CARE SYSTEM By Faustin GASHAYIJA Version 1.0 1 Table of contents Contents Table of contents... 2 Browser... 4 Log in openmrs website... 4 OpenMRS welcome page...

More information

PRECISEMAIL ANTI-SPAM GATEWAY AUTHENTICATION CASE STUDIES

PRECISEMAIL ANTI-SPAM GATEWAY AUTHENTICATION CASE STUDIES PRECISEMAIL ANTI-SPAM GATEWAY WHITEPAPER EXECUTIVE SUMMARY The rapid expansion of spam is requiring most sites to implement spam filtering solutions to keep users email boxes from becoming clogged with

More information

Mellanox Online Renewal System- Frequently Asked Questions

Mellanox Online Renewal System- Frequently Asked Questions Mellanox Online Renewal System- Frequently Asked Questions The Frequently Asked Questions (FAQs) and their responses are grouped into categories. Please click on the topic that you would like to learn

More information

Accessing vlabs using the VMware Horizon View Client for OSX

Accessing vlabs using the VMware Horizon View Client for OSX Accessing vlabs using the VMware Horizon View Client for OSX This document will demonstrate how to download, install, and connect to a virtual lab desktop from a personal Mac OSX computer using the VMware

More information

Kaseya 2. Quick Start Guide. for Network Monitor 4.1

Kaseya 2. Quick Start Guide. for Network Monitor 4.1 Kaseya 2 VMware Performance Monitor Quick Start Guide for Network Monitor 4.1 June 7, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private

More information

HOW TO USE OIT EMAIL VIA THE WEB

HOW TO USE OIT EMAIL VIA THE WEB HOW TO USE OIT EMAIL VIA THE WEB A) Logging into your MyOIT account which includes your email account 1) Open a browser such as Firefox, Chrome or Safari. Please do not use Internet Explorer. 2) In the

More information

PISA 2015 MS Online School Questionnaire: User s Manual

PISA 2015 MS Online School Questionnaire: User s Manual OECD Programme for International Student Assessment 2015 PISA 2015 MS Online School Questionnaire: User s Manual Doc: CY6_CBA_SCQ_MSPrincipalManual.docx September 2014 Produced by ETS, Core 2 Contractor

More information

Making A Work Order IT Services

Making A Work Order IT Services Making A Work Order IT Services Getting There Using a working computer with internet access, open your Browser (Internet Explorer, Firefox, etc.) Login to the KACE Service Center by typing in http://kace.coastalbend.edu

More information

Setting up a Passport York & Central Account. Setting a Password for a Central Account Step by Step Instructions.

Setting up a Passport York & Central  Account. Setting a Password for a Central  Account Step by Step Instructions. Before you begin, please ensure you have: Your 9 digit employee ID number Last four digits of your Social Insurance Number Setting up a Passport York 1. Go to Manage My Services by entering in the address

More information

Optum ID Migration for Provider Express Users

Optum ID Migration for Provider Express Users Introducing Optum ID FREQUENTLY ASKED QUESTIONS Optum ID Migration for Provider Express Users 1. What is Optum ID? A1. Optum ID is a centralized, secure identity management solution that enables a single

More information

Kaseya 2. Quick Start Guide. for Network Monitor 4.1

Kaseya 2. Quick Start Guide. for Network Monitor 4.1 Kaseya 2 Syslog Monitor Quick Start Guide for Network Monitor 4.1 June 5, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector

More information

DDN CUSTOMER SUPPORT COMMUNITY QUICK START GUIDE

DDN CUSTOMER SUPPORT COMMUNITY QUICK START GUIDE DDN CUSTOMER SUPPORT COMMUNITY QUICK START GUIDE March 10, 2015 v2 Contents Getting an Account Logging In Creating a New Case Updating an Existing Case Using the Knowledgebase Welcome to the DDN Customer

More information

7. In the boxed unlabeled field, enter the last 4 digits of your Social Security number.

7. In the boxed unlabeled field, enter the last 4 digits of your Social Security number. CREATE YOUR MYVIEW LOGIN To access myview while ensuring security, you will be given an encrypted access key token. You will use this token the first time you log into myview. Once you have successfully

More information

Kaseya 2. User Guide. for Network Monitor 4.1

Kaseya 2. User Guide. for Network Monitor 4.1 Kaseya 2 Ping Monitor User Guide for Network Monitor 4.1 June 5, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Enterprise Remote Control 5.6 Manual

Enterprise Remote Control 5.6 Manual Enterprise Remote Control 5.6 Manual Solutions for Network Administrators Copyright 2015, IntelliAdmin, LLC Revision 3/26/2015 http://www.intelliadmin.com Page 1 Table of Contents What is Enterprise Remote

More information

Nurse and Midwifery Career Long eportfolio summary guides: 1) Key functions: Getting started, logging on and moving around

Nurse and Midwifery Career Long eportfolio summary guides: 1) Key functions: Getting started, logging on and moving around Nurse and Midwifery Career Long eportfolio summary guides: 1) Key functions: Getting started, logging on and moving around Getting started In order to log on to the eportfolio you will need your username

More information

Authorize.Net. Advanced Integration Method. Miva Merchant Module. Documentation for module version 1.43. Last Updated: 5/07/03

Authorize.Net. Advanced Integration Method. Miva Merchant Module. Documentation for module version 1.43. Last Updated: 5/07/03 Authorize.Net Advanced Integration Method Miva Merchant Module Documentation for module version 1.43 Last Updated: 5/07/03 Module and documentation created by 4TheBest.net 4TheBest.net AIM Module Documentation

More information

How do I enroll in the password portal?

How do I enroll in the password portal? The self-serve portal is designed to allow you to change your password and unlock your locked account even if you have forgotten your password. You must enroll for this service to be able to use it. You

More information

MS InfoPath 2003 MS InfoPath 2007 Microsoft Office InfoPath 2003 minimally runs on the following operating systems:

MS InfoPath 2003 MS InfoPath 2007 Microsoft Office InfoPath 2003 minimally runs on the following operating systems: 8. PREPARING AND TRANSMITTING EDGARLITE SUBMISSIONS 8.1 Purpose EDGARLite is an application that uses intelligent forms to aid in the construction of filings to be submitted to EDGAR. Each EDGARLite form

More information

TechNote. Contents. Overview. Using a Windows Enterprise Root CA with DPI-SSL. Network Security

TechNote. Contents. Overview. Using a Windows Enterprise Root CA with DPI-SSL. Network Security Network Security Using a Windows Enterprise Root CA with DPI-SSL Contents Overview... 1 Deployment Considerations... 2 Configuration Procedures... 3 Importing the Public CA Certificate for Trust... 3 Importing

More information

Virtual Owl. Guide for Windows. University Information Technology Services. Training, Outreach, Learning Technologies & Video Production

Virtual Owl. Guide for Windows. University Information Technology Services. Training, Outreach, Learning Technologies & Video Production Virtual Owl Guide for Windows University Information Technology Services Training, Outreach, Learning Technologies & Video Production Copyright 2015 KSU Division of University Information Technology Services

More information

Remote Access Instructions

Remote Access Instructions document rev. 8 updated 6/28/2012 Remote Access Instructions Table of Contents... Page 1 Finding the AFS Remote Access links and the AFS home page... 2 First time login with RSA fob (AFS option 1 SSL VPN

More information

PSYCHOLOGY RESEARCH PARTICIPATION SYSTEM (PRPS) Student User Guide

PSYCHOLOGY RESEARCH PARTICIPATION SYSTEM (PRPS) Student User Guide PSYCHOLOGY RESEARCH PARTICIPATION SYSTEM (PRPS) Student User Guide Experiment Management System, Sona Systems Copyright 2007, Psychology Dept. Trent University INTRODUCTION The Psychology Department has

More information

Self-Service Password Manager

Self-Service Password Manager WWW.ROSE-HULMAN.EDU/EIT OFFICE OF ENTERPRISE INFORMATION TECHNOLOGY Self-Service Password Manager Rose-Hulman Institute of Technology has implemented a self-service password manager that provides an easy-to-use

More information

(Refer Slide Time: 01:52)

(Refer Slide Time: 01:52) Software Engineering Prof. N. L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture - 2 Introduction to Software Engineering Challenges, Process Models etc (Part 2) This

More information

POST SCHOOL EXAMINATIONS

POST SCHOOL EXAMINATIONS The Kenya National Examinations Council POST SCHOOL EXAMINATIONS TECHNICAL AND BUSINESS (BTEP & BMGT) EXAMINATIONS USER MANUAL FOR CANDIDATES ONLINE REGISTRATION FEBRUARY 2014 Table of Contents 1.0. ACCESSING

More information

From a Finder window choose Applications (shown circled in red) and then double click the Tether icon (shown circled in green).

From a Finder window choose Applications (shown circled in red) and then double click the Tether icon (shown circled in green). From a Finder window choose Applications (shown circled in red) and then double click the Tether icon (shown circled in green). You will be presented with a dialog box asking for you to enter an ad-hoc

More information

QMB 3302 - Business Analytics CRN 80700 - Fall 2015 T & R 9.30 to 10.45 AM -- Lutgert Hall 2209

QMB 3302 - Business Analytics CRN 80700 - Fall 2015 T & R 9.30 to 10.45 AM -- Lutgert Hall 2209 QMB 3302 - Business Analytics CRN 80700 - Fall 2015 T & R 9.30 to 10.45 AM -- Lutgert Hall 2209 Elias T. Kirche, Ph.D. Associate Professor Department of Information Systems and Operations Management Lutgert

More information

MANAGED SOFTWARE CENTER USER S GUIDE

MANAGED SOFTWARE CENTER USER S GUIDE U N I V E R S I T Y O F S O U T H E R N C A L I F O R N I A MANAGED SOFTWARE CENTER USER S GUIDE JANUARY 2015 U N I V E R S I T Y O F S O U T H E R N C A L I F O R N I A 2015 UNIVERSITY OF SOUTHERN CALIFORNIA.

More information

Sona Systems, Ltd. EXPERIMENT MANAGEMENT SYSTEM Master Documentation Set

Sona Systems, Ltd. EXPERIMENT MANAGEMENT SYSTEM Master Documentation Set Sona Systems, Ltd. EXPERIMENT MANAGEMENT SYSTEM Master Documentation Set Version 2.61 Revision A Copyright 2005 Sona Systems, Ltd., All Rights Reserved About This Manual This manual covers usage of the

More information

Last modified on 03-01-2010 for application version 4.4.4

Last modified on 03-01-2010 for application version 4.4.4 Last modified on 03-01-2010 for application version 4.4.4 RemotePC User Manual Table of Contents Introduction... 3 Features... 3 Install the Remote Access Host application... 4 Install the Remote Access

More information

How to Access the Economics Undergraduate Lab

How to Access the Economics Undergraduate Lab How to Access the Economics Undergraduate Lab Please note that only students in a few selected courses will be able to activate their Economics Undergraduate Lab account. If this account is not listed

More information

IntelliPay Billpay Application Documentation

IntelliPay Billpay Application Documentation IntelliPay Billpay Application Documentation Contents Billpay Introduction First Time Payment (With username and password) First Time Payment (Without username and password) Returning Customer Introduction:

More information

Google Trusted Stores Setup in Magento

Google Trusted Stores Setup in Magento Google Trusted Stores Setup in Magento Google Trusted Stores is a free badging program that can improve your conversion rate and average order size by reassuring potential customers you offer a great shopping

More information

Lab 1: Network Devices and Technologies - Capturing Network Traffic

Lab 1: Network Devices and Technologies - Capturing Network Traffic CompTIA Security+ Lab Series Lab 1: Network Devices and Technologies - Capturing Network Traffic CompTIA Security+ Domain 1 - Network Security Objective 1.1: Explain the security function and purpose of

More information

STATE OF INDIANA INDIANA GOVERNMENT CENTER NORTH 100 NORTH SENATE AVENUE N1058 (B) INDIANAPOLIS, IN 46204 PHONE (317) 232-3777 FAX (317) 232-8779

STATE OF INDIANA INDIANA GOVERNMENT CENTER NORTH 100 NORTH SENATE AVENUE N1058 (B) INDIANAPOLIS, IN 46204 PHONE (317) 232-3777 FAX (317) 232-8779 DEPARTMENT OF LOCAL GOVERNMENT FINANCE STATE OF INDIANA INDIANA GOVERNMENT CENTER NORTH 100 NORTH SENATE AVENUE N1058 (B) INDIANAPOLIS, IN 46204 PHONE (317) 232-3777 FAX (317) 232-8779 Indiana Property

More information

Pushing the Envelope on Data-Driven Security Awareness Mark T. Chapman CFE CISSP CISM CRISC

Pushing the Envelope on Data-Driven Security Awareness Mark T. Chapman CFE CISSP CISM CRISC Pushing the Envelope on Data-Driven Security Awareness Mark T. Chapman CFE CISSP CISM CRISC Presentation Overview The Importance of Perspective. The diagram at the right represents the four perspectives

More information

Logging into LTC Instant Access the First Time

Logging into LTC Instant Access the First Time Logging into LTC Instant Access the First Time Access the Instant Access website at: https://mycampus.gotoltc.edu Enter your LTC network username and password. These are the credentials you use to initially

More information

Access Control and Audit Trail Software

Access Control and Audit Trail Software Varian, Inc. 2700 Mitchell Drive Walnut Creek, CA 94598-1675/USA Access Control and Audit Trail Software Operation Manual Varian, Inc. 2002 03-914941-00:3 Table of Contents Introduction... 1 Access Control

More information

You need to be assigned and logged in to the system by the Records Management Service in order to use it.

You need to be assigned and logged in to the system by the Records Management Service in order to use it. Guidance for using the Records Management Service software The software can be used to undertake the following tasks:- 1. Sending information about the boxes to be transferred to the Records Centre. 2.

More information

Salesforce Customer Relationships Management (CRM) System

Salesforce Customer Relationships Management (CRM) System Salesforce Customer Relationships Management (CRM) System User s Manual for External Users Version 0.3 1 st May 2015 Contents 1. Customer relationship management (CRM) system.... 3 1.1 Intro and Login...

More information

White Paper Combining Attitudinal Data and Behavioral Data for Meaningful Analysis

White Paper Combining Attitudinal Data and Behavioral Data for Meaningful Analysis MAASSMEDIA, LLC WEB ANALYTICS SERVICES White Paper Combining Attitudinal Data and Behavioral Data for Meaningful Analysis By Abigail Lefkowitz, MaassMedia Executive Summary: In the fast-growing digital

More information

Connecting to Wi-Fi Using Windows 7

Connecting to Wi-Fi Using Windows 7 CALIFORNIA STATE UNIVERSITY, LOS ANGELES INFORMATION TECHNOLOGY SERVICES Connecting to Wi-Fi Using Windows 7 Summer 2015, Version 2.0 Table of Contents Introduction...2 Configuring Your Device...2 Onboarding

More information

Intellect Platform - The Workflow Engine Basic HelpDesk Troubleticket System - A102

Intellect Platform - The Workflow Engine Basic HelpDesk Troubleticket System - A102 Intellect Platform - The Workflow Engine Basic HelpDesk Troubleticket System - A102 Interneer, Inc. Updated on 2/22/2012 Created by Erika Keresztyen Fahey 2 Workflow - A102 - Basic HelpDesk Ticketing System

More information

UHC-iEnroll Offline Software Frequently Asked Questions

UHC-iEnroll Offline Software Frequently Asked Questions UHC-iEnroll Offline Software Frequently Asked Questions Q. How do I know if I am picking the right application from the drop down my paper form doesn t look like this? Please contact the Producer Help

More information

CECH Virtual Lab Guide Windows 7/Vista Edition

CECH Virtual Lab Guide Windows 7/Vista Edition CECH Virtual Lab Guide Windows 7/Vista Edition Introduction: This guide is a step-by-step walkthrough of installing, configuring, and using the VMware Horizon View Client to access the University of Cincinnati

More information

BCMB QUALITY MONITORING SYSTEM. Depot Operator Login and Usage Instructions

BCMB QUALITY MONITORING SYSTEM. Depot Operator Login and Usage Instructions BCMB QUALITY MONITORING SYSTEM Depot Operator Login and Usage Instructions Quality Monitoring System The Quality Monitoring System is being utilized by Alberta s beverage container recycling industry to

More information

DataDirector Getting Started

DataDirector Getting Started DataDirector Getting Started LOGIN Log into the DataDirector website: https://www.achievedata.com/yourdistrictname User Name: New Password: Enter your User Name and Password o After login, you may need

More information

ARMORVOX IMPOSTORMAPS HOW TO BUILD AN EFFECTIVE VOICE BIOMETRIC SOLUTION IN THREE EASY STEPS

ARMORVOX IMPOSTORMAPS HOW TO BUILD AN EFFECTIVE VOICE BIOMETRIC SOLUTION IN THREE EASY STEPS ARMORVOX IMPOSTORMAPS HOW TO BUILD AN EFFECTIVE VOICE BIOMETRIC SOLUTION IN THREE EASY STEPS ImpostorMaps is a methodology developed by Auraya and available from Auraya resellers worldwide to configure,

More information

WorkKeys Internet Version Test Administration and User Guide

WorkKeys Internet Version Test Administration and User Guide WorkKeys Internet Version Test Administration and User Guide ACT endorses the Code of Fair Testing Practices in Education and the Code of Professional Responsibilities in Educational Measurement, guides

More information

Aeroqual Connect and Cloud

Aeroqual Connect and Cloud Aeroqual Connect and Cloud Page 1 Contents 1. Introduction to Aeroqual Connect and Cloud... 3 1.2. Aeroqual Connect... 3 1.3. Aeroqual Cloud... 3 2. How to Connect... 4 2.1. Aeroqual Connect... 4 2.1.1.

More information

Lab 2: Secure Network Administration Principles - Log Analysis

Lab 2: Secure Network Administration Principles - Log Analysis CompTIA Security+ Lab Series Lab 2: Secure Network Administration Principles - Log Analysis CompTIA Security+ Domain 1 - Network Security Objective 1.2: Apply and implement secure network administration

More information

Schools Remote Access Server

Schools Remote Access Server Schools Remote Access Server This system is for school use only. Not for personal or private file use. Please observe all of the school district IT rules. 6076 State Farm Rd., Guilderland, NY 12084 Phone:

More information

CPS VPN Client Installation Guide

CPS VPN Client Installation Guide CPS VPN Client Installation Guide 1. Make sure you have Administrative Rights to perform a CPS VPN Client Installation on your computer. 2. Please close all the open applications before proceeding with

More information

Configuring the USB Wireless Adapter with GXV3140

Configuring the USB Wireless Adapter with GXV3140 Configuring the USB Wireless Adapter with GXV3140 1.1 How to Enable Wifi Features 1.1.1 Configuring using the web configuration interface Type the IP address of the GXV3140 (as shown on the phone LCD screen,

More information

Running Argos via VPN client

Running Argos via VPN client These instructions will show you how to run Argos reports from a home PC or laptop. Argos is not a web based program. It runs from NSU s network. To establish a connection, we need three components; the

More information

Personal Computer and Mobile Printing

Personal Computer and Mobile Printing Personal Computer and Mobile Printing IT Services now offers students, faculty, and staff the ability to print from personal laptops and Apple ios devices on the Fort Wayne campus without having access

More information

simplify printing TX Guide v. 1. make IT simple Tricerat, Inc. 11500 Cronridge Drive Suite 100 Owings Mills, MD 21117 201, All rights Reserved

simplify printing TX Guide v. 1. make IT simple Tricerat, Inc. 11500 Cronridge Drive Suite 100 Owings Mills, MD 21117 201, All rights Reserved simplify printing TX Guide v. 1. Tricerat, Inc. 11500 Cronridge Drive Suite 100 Owings Mills, MD 21117 make IT simple 201, All rights Reserved Release Info Copyright Limit of Liability Trademarks Customer

More information

JIJIS Frequently Asked Questions

JIJIS Frequently Asked Questions JIJIS Frequently Asked Questions Contents A. About JIJIS... 2 B. Registration... 3 C. Sign in... 5 D. Setting... 7 E. Job Posting... 8 F. BR certificate... 11 G. Job Applying... 12 H. Others... 13 A. About

More information

Online Testing Engine

Online Testing Engine Online Testing Engine Table of Contents Considerations...2 Minimum System Rquirements...3 School Test Leaders... 4 Teachers Administering Tests...5 Online Testing Functionality...7 Online Data Entry for

More information

Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users

Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users Getting Started Getting Started with Time Warner Cable Business Class Voice Manager A Guide for Administrators and Users Table of Contents Table of Contents... 2 How to Use This Guide... 3 Administrators...

More information

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.2 November 2015 Last modified: November 3, 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing

More information

For Internet Facing and Private Data Systems

For Internet Facing and Private Data Systems For Internet Facing and Private Data Systems Audience Prerequisites Course Overview Day 1 Section 1: Functionality and Purpose Day 2 Section 2: Policies and Alerts Section 3: Live Lab 2 Lab Setup Course

More information

Sona Systems, Ltd. EXPERIMENT MANAGEMENT SYSTEM Master Documentation Set

Sona Systems, Ltd. EXPERIMENT MANAGEMENT SYSTEM Master Documentation Set Sona Systems, Ltd. EXPERIMENT MANAGEMENT SYSTEM Master Documentation Set Version 2.65 Copyright 2006 Sona Systems, Ltd., All Rights Reserved About This Manual This manual covers usage of the system from

More information

Marcum LLP MFT Guide

Marcum LLP MFT Guide MFT Guide Contents 1. Logging In...3 2. Installing the Upload Wizard...4 3. Uploading Files Using the Upload Wizard...5 4. Downloading Files Using the Upload Wizard...8 5. Frequently Asked Questions...9

More information

Citrix for Mac Installation

Citrix for Mac Installation While some MCPS applications run on Macintosh computers, other applications do not function properly. One method to get these applications (such as Outlook and Special Education s O/SS) is to add a mini-program

More information

Managed Devices - Web Browser/HiView

Managed Devices - Web Browser/HiView Managed Devices - Web Browser/HiView All Hirschmann managed devices have a web based GUI interface available for configuration purposes. This is typically the primary means of configuration used for most

More information

Welcome to Your FCSL Student Web Portal. Course Schedule Students can view and search course schedules and view class details.

Welcome to Your FCSL Student Web Portal. Course Schedule Students can view and search course schedules and view class details. Welcome to Your FCSL Student Web Portal Course Schedule Students can view and search course schedules and view class details. Online Registration Online registration allows students to register for courses

More information

Wrightstown School District

Wrightstown School District Wrightstown School District Overview E-help desk gives you the ability to create your own Help Desk tickets. It also allows you to be able to check the status of your requests, and add updates (comments)

More information

Steps for provider to acquire A&A login credentials and make renewal payment

Steps for provider to acquire A&A login credentials and make renewal payment Steps for provider to acquire A&A login credentials and make renewal payment *** PLEASE NOTE: The changes to System Registry are such that a provider can either pay their own renewal or designate a service

More information

Quick Reference for Parents - 1

Quick Reference for Parents - 1 Quick Reference for Parents This reference will contain general information for parents including how to access Echo and what content is available for viewing. Getting Started What is Echo? Echo is an

More information

ASTP Online. Assisted School Travel Program. Student Rollover User Guide. NSW Department of Education

ASTP Online. Assisted School Travel Program. Student Rollover User Guide. NSW Department of Education ASTP Online Assisted School Travel Program Student Rollover User Guide NSW Department of Education Table of Contents Introduction 2 Accessing ASTP Online 2 Locating ASTP online 2 Orientation of ASTP Online

More information

STUDENT INSTRUCTIONS FOR SOUTHEAST MISSOURI STATE UNIVERSITY S PSYCHOLOGY RESEARCH WEBSITE (https://semo.sona-systems.com)

STUDENT INSTRUCTIONS FOR SOUTHEAST MISSOURI STATE UNIVERSITY S PSYCHOLOGY RESEARCH WEBSITE (https://semo.sona-systems.com) STUDENT INSTRUCTIONS FOR SOUTHEAST MISSOURI STATE UNIVERSITY S PSYCHOLOGY RESEARCH WEBSITE (https://semo.sona-systems.com) Introduction The Psychology Research website provides an easy method for you to

More information

Student Employment Website User Guide for Off-Campus Employers

Student Employment Website User Guide for Off-Campus Employers Student Employment Website User Guide for Off-Campus Employers Student Employment University Hall 255 2197 South University Boulevard Denver, Colorado 80208 Ph: 303.871.6792 Fax: 303.871.2341 Email: stuemp@du.edu

More information

VMware vcenter Log Insight Getting Started Guide

VMware vcenter Log Insight Getting Started Guide VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

econtrol 3.5 for Active Directory & Exchange Self-Service Guide

econtrol 3.5 for Active Directory & Exchange Self-Service Guide econtrol 3.5 for Active Directory & Exchange Self-Service Guide This Guide Welcome to the econtrol 3.5 for Active Directory and Exchange Self-Service Guide. This guide is econtrol end-users who have been

More information

QMB 3302 - Business Analytics CRN 82361 - Fall 2015 W 6:30-9:15 PM -- Lutgert Hall 2209

QMB 3302 - Business Analytics CRN 82361 - Fall 2015 W 6:30-9:15 PM -- Lutgert Hall 2209 QMB 3302 - Business Analytics CRN 82361 - Fall 2015 W 6:30-9:15 PM -- Lutgert Hall 2209 Rajesh Srivastava, Ph.D. Professor and Chair, Department of Information Systems and Operations Management Lutgert

More information

Remote Access Services Microsoft Windows - Installation Guide

Remote Access Services Microsoft Windows - Installation Guide Remote Access Services Microsoft Windows - Installation Guide Version 3.1 February 23, 2015 1 P age Contents GETTING STARTED... 3 JAVA VERIFICATION, INSTALLATION, AND CONFIGURATION... 3 Windows XP... 3

More information

AESDIRECT ACCOUNT ADMINISTRATION USER GUIDE

AESDIRECT ACCOUNT ADMINISTRATION USER GUIDE AESDIRECT ACCOUNT ADMINISTRATION USER GUIDE Updated June 24, 2014 Table of Contents OVERVIEW... 3 AESDirect Roles Defined... 3 Account Administrator... 3 User Managers... 3 Users... 4 AESDIRECT RULES...

More information

Recommended Browser Setting for MySBU Portal

Recommended Browser Setting for MySBU Portal The MySBU portal is built using Microsoft s SharePoint technology framework, therefore, for the best viewing experience, Southwest Baptist University recommends the use of Microsoft s Internet Explorer,

More information

Single Sign On (SSO) Implementation Manual. For Connect 5 & MyConnect Sites

Single Sign On (SSO) Implementation Manual. For Connect 5 & MyConnect Sites Single Sign On (SSO) Implementation Manual For Connect 5 & MyConnect Sites Version 6 Release 5.7 September 2013 1 What is Blackboard Connect Single Sign On?... 3 How it Works... 3 Drawbacks to Using Single

More information